{"title":"Tailored platforms as cloud service","authors":"Martin Bobák, L. Hluchý, V. Tran","doi":"10.1109/SISY.2015.7325408","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325408","url":null,"abstract":"Cloud computing is one of the key tools used in the analysis of big data. Cloud users have the option to work with the infrastructure (IaaS) or with the platform (PaaS). At first glance it may seem that PaaS is an ideal tool for this task. However, a closer look at PaaS reveals that there are several problems regarding clouds. The main problem is the static aspect of clouds. Users cannot customize the platform on their demand. They have to change the platform or work with the existing cloud infrastructure. Therefore the concept of tailored platform is presented in this paper. Tailored platforms are adaptable to the requirements of users. An abstract model was used for designing the tailored platforms architecture. The platforms are deployed in the clouds environment consists of clouds provided by different providers (multicloud environment). Users also have the opportunity to optimize the application runs using multiple criteria.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Externalities and the optimal allocation of economic resources","authors":"E. Pataki, A. Sagi, Jozef Kabok","doi":"10.1109/SISY.2015.7325376","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325376","url":null,"abstract":"The authors consider the problems of influence of externalities on the Pareto optimal allocation of economic resources in the market economy. The analysis of the market equilibrium model in the conditions of competitive market and in case of positive and negative externalities shows a suboptimal allocation of production factors. In case of positive externalities, the equilibrium output is under the socially optimal one, i.e. an optimal solution is obtained. Negative externalities result in output that is bigger than socially optimal, i.e. certain economically unjustified hyperinflation. At the end of the work, the authors draw conclusion that interventions are necessary, both in case of positive and negative externalities, in order to modify individual decisions of market actors to eliminate suboptimal equilibrium states, i.e. suboptimal market strategies.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"35 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132153414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining the priority of heat sources used in district heating","authors":"Bela Goblyos, M. Reger","doi":"10.1109/SISY.2015.7325402","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325402","url":null,"abstract":"In this paper the measure of priority attributed to the different heat sources produced locally and used in the energy supply of a given settlement using district heating will be shown. The rate of district heating is introduced and its critical value that shows whether the settlement is able to self-supplement its district heat demand or not is determined. Two algorithms - depending on the legal environment - are established for the optimal use of local heat sources, one that deals with cogeneration and one that does not.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Duraković, S. Medić, T. Grbić, Sandra Buhmiler, S. Rapajić
{"title":"Integration of pseudo-polynomials based on g-integrals","authors":"N. Duraković, S. Medić, T. Grbić, Sandra Buhmiler, S. Rapajić","doi":"10.1109/SISY.2015.7325399","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325399","url":null,"abstract":"The natural generalization of classical polynomials are the pseudo-polynomials and the pseudo-polynomials with interval coefficients too. The main topic of this paper is the g-integration of special functions, i.e. the g-integration of pseudo-polynomials.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Chtourou, M. Kharrat, N. B. Amor, M. Jallouli, Mohamed Abid
{"title":"Proof of concept of a cloud compilation service for robotics wireless programming","authors":"S. Chtourou, M. Kharrat, N. B. Amor, M. Jallouli, Mohamed Abid","doi":"10.1109/SISY.2015.7325398","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325398","url":null,"abstract":"Ubiquitous computing, known also as internet of things, is often considered as the post internet revolution, where devices are embedded in everyday objects that can communicate and take decision automatically without human intervention. However, in spite of their quick popularity and the maturity of both embedded architectures and computer science programming, designing flexible ubiquitous system remains a complex task especially for beginners. The main objective is to create a flexible platform designed to facilitate the design of embedded systems for ubiquitous applications. This platform is suitable for users with low programming skills. As a proof of concept, the authors choose as ubiquitous system a mobile robot that its functionality can be modified easily by the proposed platform. The compilation of the code corresponding to the new robot functionality is obtained using a distant CLOUD server, the program is compiled there, then loaded to the robot using a wireless programmer. In this paper the authors present the general structure of the designed system, then they go through the different steps to implement the robot compiler in the cloud and test it.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Angel L. Garrido, M. G. Buey, S. Ilarri, I. Furstner, L. Szedmina
{"title":"KGNR: A knowledge-based geographical news recommender","authors":"Angel L. Garrido, M. G. Buey, S. Ilarri, I. Furstner, L. Szedmina","doi":"10.1109/SISY.2015.7325378","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325378","url":null,"abstract":"Online news reading services, such as Google News and Yahoo! News, have become very popular since the Internet provides fast access to news articles from various sources around the world. A key issue of these services is to help users to find interesting articles that match their preferences as much as possible. This is the problem of personalized news recommendation. Recently, personalized news recommendation has become a promising research direction and a variety of techniques have been proposed to tackle it, including content-based systems, collaborative filtering systems and hybrid versions of these two. In addition, the widespread use of mobile phones today and the different features that these phones offer users allow the possibility to keep users up to date with the latest news that have taken place in their environment, anywhere and at any time. This paper presents KGNR (Knowledge-based Geographical News Recommender), a new approach to develop a personalized news recommendation system as an application for mobile phones that takes into account the geolocation of the user and uses learned user profiles to generate personalized news recommendations. For this purpose, a content-based recommendation mechanism have been combined with topic-maps and geolocation for modeling the recommendation system.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facilitation of obstacle detection by utilization of low-cost sensors in the case of mobile robots","authors":"Lukacs Gutasi, E. Burkus, P. Odry","doi":"10.1109/SISY.2015.7325375","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325375","url":null,"abstract":"The aim of this paper is to introduce a novel method for facilitating the detection of surrounding obstacles in the case of inexpensive mobile robots. For this purpose, a cheap ultrasound radar and a simple camera were used. By combining the signals of these two sensors, the robot was able to determine the distance, orientation, and dimensions of the objects located around it. Beside software methods, the quality of the detection was improved with practical approaches as well.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132449062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithmic trading systems","authors":"W. Gruver","doi":"10.1109/SISY.2015.7325393","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325393","url":null,"abstract":"Although many of the world's markets have rebounded since the crash of 2008, it is believed a major correction is overdue. Some even claim that the markets are rigged in favor of those who employ high speed fiber network connections with the exchanges to front run trades. Nevertheless, it is acknowledged that the change from open outcry pits to fully electronic exchanges, and the increased use of algorithmic trading systems, requires a new approach to investment decisions.","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125486523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern binary attacks and defences in the windows environment — Fighting against microsoft EMET in seven rounds","authors":"Z. Németh","doi":"10.1109/SISY.2015.7325394","DOIUrl":"https://doi.org/10.1109/SISY.2015.7325394","url":null,"abstract":"In this paper some basic elements of the “Eternal war in the memory” [1] are investigated from a practical perspective. While that article provides an excellent theoretical overview and surveys the contemporary attacks and defences, here some concrete examples of binary exploitation are presented as a case study. As a running example we take a recent buffer overflow vulnerability of the TestDisk application [2], and offer an easy-to-follow walkthrough of some exploitation techniques and tricks against Microsoft Enhanced Mitigation Experience Toolkit (EMET).","PeriodicalId":144551,"journal":{"name":"2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"47 42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}